Skip to content
View jiangdada6's full-sized avatar

Block or report jiangdada6

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
216 stars written in C
Clear filter

A little tool to play with Windows security

C 21,471 4,092 Updated Apr 17, 2026

Simple tool to configure Windows Filtering Platform (WFP) which can configure network activity on your computer.

C 8,362 619 Updated Apr 20, 2026

Defeating Windows User Account Control

C 7,537 1,421 Updated Feb 17, 2026

Own your AI. The native macOS harness for AI agents -- any model, persistent memory, autonomous execution, cryptographic identity. Built in Swift. Fully offline. Open source.

C 5,160 261 Updated Apr 29, 2026

Kyanos is a networking analysis tool using eBPF. It can visualize the time packets spend in the kernel, capture requests/responses, makes troubleshooting more efficient.

C 5,013 228 Updated Apr 29, 2026

Dopamine is a semi-untethered jailbreak for iOS 15 and 16

C 4,991 6,052 Updated Apr 26, 2026

Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters

C 4,557 738 Updated Jul 8, 2025

Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 9…

C 2,443 332 Updated Apr 17, 2024

Open-Source Shellcode & PE Packer

C 2,096 329 Updated Feb 3, 2024

The swiss army knife of LSASS dumping

C 2,094 262 Updated Sep 17, 2024

🇺🇦 Windows driver with usermode interface which can hide processes, file-system and registry objects, protect processes and etc

C 2,010 504 Updated Jul 13, 2022

A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server.

C 1,859 241 Updated Nov 3, 2024

Situational Awareness commands implemented using Beacon Object Files

C 1,783 285 Updated Mar 10, 2026

Stealthy Linux Kernel Rootkit for modern kernels (6x)

C 1,628 179 Updated Apr 21, 2026

Macro-header for compile-time C obfuscation (tcc, win x86/x64)

C 1,610 133 Updated Feb 14, 2026

LSASS memory dumper using direct system calls and API unhooking.

C 1,581 251 Updated Jan 5, 2021

Bypass Chromium's App-Bound Encryption via Direct Syscall-based Reflective Process Hollowing. Extract cookies, passwords, payment methods & tokens from Chrome, Edge, Brave & Avast - fileless, user-…

C 1,555 259 Updated Feb 9, 2026

Dump cookies and credentials directly from Chrome/Edge process memory

C 1,445 136 Updated Apr 9, 2026

A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!

C 1,412 270 Updated Nov 22, 2023

A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techniques.

C 1,384 216 Updated Oct 27, 2023

Research code & papers from members of vx-underground.

C 1,375 255 Updated Dec 7, 2021

HVNC for Cobalt Strike

C 1,323 204 Updated Dec 7, 2023

A memory-based evasion technique which makes shellcode invisible from process start to end.

C 1,198 140 Updated Oct 16, 2023

A root exploit for CVE-2022-0847 (Dirty Pipe)

C 1,126 221 Updated Mar 8, 2022

C/C++ source obfuscator for antivirus bypass

C 1,067 190 Updated Mar 10, 2022

Cobalt Strike UDRL for memory scanner evasion.

C 1,014 179 Updated Jun 4, 2024

A protective and Low Level Shellcode Loader that defeats modern EDR systems.

C 917 144 Updated Mar 20, 2024

Sleep Obfuscation

C 834 115 Updated Dec 3, 2023

助力每一位RT队员,快速生成免杀木马

C 832 106 Updated Apr 17, 2024

A collection of my Semgrep rules to facilitate vulnerability research.

C 810 85 Updated Apr 12, 2026
Next